Difference between revisions of "MITRE ATT&CK"
Jump to navigation
Jump to search
Line 3: | Line 3: | ||
The MITRE ATT&CK knowledge-base is freely available to everyone. THE MITRE ATT&CK knowledge base documents the common tactics, techniques and procedures used by cyber adversaries. It can serve as a valuable resource for the development of specific threat models and methodologies. <ref name=”RE1”>"MITRE ATT&CK" - Abrufbar unter: https://www.mitre.org/focus-areas/cybersecurity/mitre-attack</ref> | The MITRE ATT&CK knowledge-base is freely available to everyone. THE MITRE ATT&CK knowledge base documents the common tactics, techniques and procedures used by cyber adversaries. It can serve as a valuable resource for the development of specific threat models and methodologies. <ref name=”RE1”>"MITRE ATT&CK" - Abrufbar unter: https://www.mitre.org/focus-areas/cybersecurity/mitre-attack</ref> | ||
==MITRE ATT&CK Groups== | |||
==MITRE ATT&CK Software== | |||
==MITRE ATT&CK Tactics== | |||
==MITRE ATT&CK Techniques== | |||
==MITRE ATT&CK Matrix for Enterprise== | ==MITRE ATT&CK Matrix for Enterprise== |
Revision as of 07:48, 3 January 2024
Introduction
Developed by MITRE, ATT&CK is a globally accessible knowledge base focused on adversary behaviour. Cyber adversaries are notorious for their intelligence, adaptability, and persistence, learning from each attack, whether successful or unsuccessful. Their capabilities range from stealing personal information to disrupting critical infrastructure and damaging business operations. The MITRE ATT&CK knowledge-base is freely available to everyone. THE MITRE ATT&CK knowledge base documents the common tactics, techniques and procedures used by cyber adversaries. It can serve as a valuable resource for the development of specific threat models and methodologies. [1]
MITRE ATT&CK Groups
MITRE ATT&CK Software
MITRE ATT&CK Tactics
MITRE ATT&CK Techniques
MITRE ATT&CK Matrix for Enterprise
Reconnaissance
Ressource Development
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential Access
Discovery
Lateral Movement
Command and Controll
Exfiltration
Impact
References
- ↑ "MITRE ATT&CK" - Abrufbar unter: https://www.mitre.org/focus-areas/cybersecurity/mitre-attack